Merge tag 'ext4_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tytso...
[linux-2.6-block.git] / fs / ext4 / xattr.c
index a2f04a3808db57677377232224e56fdb10c1dc86..62f2ec599218354caf9ea8ef4600cb59a200a0a8 100644 (file)
@@ -184,27 +184,73 @@ ext4_xattr_handler(int name_index)
 }
 
 static int
-ext4_xattr_check_entries(struct ext4_xattr_entry *entry, void *end,
-                        void *value_start)
+check_xattrs(struct inode *inode, struct buffer_head *bh,
+            struct ext4_xattr_entry *entry, void *end, void *value_start,
+            const char *function, unsigned int line)
 {
        struct ext4_xattr_entry *e = entry;
+       int err = -EFSCORRUPTED;
+       char *err_str;
+
+       if (bh) {
+               if (BHDR(bh)->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC) ||
+                   BHDR(bh)->h_blocks != cpu_to_le32(1)) {
+                       err_str = "invalid header";
+                       goto errout;
+               }
+               if (buffer_verified(bh))
+                       return 0;
+               if (!ext4_xattr_block_csum_verify(inode, bh)) {
+                       err = -EFSBADCRC;
+                       err_str = "invalid checksum";
+                       goto errout;
+               }
+       } else {
+               struct ext4_xattr_ibody_header *header = value_start;
+
+               header -= 1;
+               if (end - (void *)header < sizeof(*header) + sizeof(u32)) {
+                       err_str = "in-inode xattr block too small";
+                       goto errout;
+               }
+               if (header->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC)) {
+                       err_str = "bad magic number in in-inode xattr";
+                       goto errout;
+               }
+       }
 
        /* Find the end of the names list */
        while (!IS_LAST_ENTRY(e)) {
                struct ext4_xattr_entry *next = EXT4_XATTR_NEXT(e);
-               if ((void *)next >= end)
-                       return -EFSCORRUPTED;
-               if (strnlen(e->e_name, e->e_name_len) != e->e_name_len)
-                       return -EFSCORRUPTED;
+               if ((void *)next >= end) {
+                       err_str = "e_name out of bounds";
+                       goto errout;
+               }
+               if (strnlen(e->e_name, e->e_name_len) != e->e_name_len) {
+                       err_str = "bad e_name length";
+                       goto errout;
+               }
                e = next;
        }
 
        /* Check the values */
        while (!IS_LAST_ENTRY(entry)) {
                u32 size = le32_to_cpu(entry->e_value_size);
+               unsigned long ea_ino = le32_to_cpu(entry->e_value_inum);
 
-               if (size > EXT4_XATTR_SIZE_MAX)
-                       return -EFSCORRUPTED;
+               if (!ext4_has_feature_ea_inode(inode->i_sb) && ea_ino) {
+                       err_str = "ea_inode specified without ea_inode feature enabled";
+                       goto errout;
+               }
+               if (ea_ino && ((ea_ino == EXT4_ROOT_INO) ||
+                              !ext4_valid_inum(inode->i_sb, ea_ino))) {
+                       err_str = "invalid ea_ino";
+                       goto errout;
+               }
+               if (size > EXT4_XATTR_SIZE_MAX) {
+                       err_str = "e_value size too large";
+                       goto errout;
+               }
 
                if (size != 0 && entry->e_value_inum == 0) {
                        u16 offs = le16_to_cpu(entry->e_value_offs);
@@ -216,66 +262,54 @@ ext4_xattr_check_entries(struct ext4_xattr_entry *entry, void *end,
                         * the padded and unpadded sizes, since the size may
                         * overflow to 0 when adding padding.
                         */
-                       if (offs > end - value_start)
-                               return -EFSCORRUPTED;
+                       if (offs > end - value_start) {
+                               err_str = "e_value out of bounds";
+                               goto errout;
+                       }
                        value = value_start + offs;
                        if (value < (void *)e + sizeof(u32) ||
                            size > end - value ||
-                           EXT4_XATTR_SIZE(size) > end - value)
-                               return -EFSCORRUPTED;
+                           EXT4_XATTR_SIZE(size) > end - value) {
+                               err_str = "overlapping e_value ";
+                               goto errout;
+                       }
                }
                entry = EXT4_XATTR_NEXT(entry);
        }
-
+       if (bh)
+               set_buffer_verified(bh);
        return 0;
+
+errout:
+       if (bh)
+               __ext4_error_inode(inode, function, line, 0, -err,
+                                  "corrupted xattr block %llu: %s",
+                                  (unsigned long long) bh->b_blocknr,
+                                  err_str);
+       else
+               __ext4_error_inode(inode, function, line, 0, -err,
+                                  "corrupted in-inode xattr: %s", err_str);
+       return err;
 }
 
 static inline int
 __ext4_xattr_check_block(struct inode *inode, struct buffer_head *bh,
                         const char *function, unsigned int line)
 {
-       int error = -EFSCORRUPTED;
-
-       if (BHDR(bh)->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC) ||
-           BHDR(bh)->h_blocks != cpu_to_le32(1))
-               goto errout;
-       if (buffer_verified(bh))
-               return 0;
-
-       error = -EFSBADCRC;
-       if (!ext4_xattr_block_csum_verify(inode, bh))
-               goto errout;
-       error = ext4_xattr_check_entries(BFIRST(bh), bh->b_data + bh->b_size,
-                                        bh->b_data);
-errout:
-       if (error)
-               __ext4_error_inode(inode, function, line, 0, -error,
-                                  "corrupted xattr block %llu",
-                                  (unsigned long long) bh->b_blocknr);
-       else
-               set_buffer_verified(bh);
-       return error;
+       return check_xattrs(inode, bh, BFIRST(bh), bh->b_data + bh->b_size,
+                           bh->b_data, function, line);
 }
 
 #define ext4_xattr_check_block(inode, bh) \
        __ext4_xattr_check_block((inode), (bh),  __func__, __LINE__)
 
 
-static int
+static inline int
 __xattr_check_inode(struct inode *inode, struct ext4_xattr_ibody_header *header,
                         void *end, const char *function, unsigned int line)
 {
-       int error = -EFSCORRUPTED;
-
-       if (end - (void *)header < sizeof(*header) + sizeof(u32) ||
-           (header->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC)))
-               goto errout;
-       error = ext4_xattr_check_entries(IFIRST(header), end, IFIRST(header));
-errout:
-       if (error)
-               __ext4_error_inode(inode, function, line, 0, -error,
-                                  "corrupted in-inode xattr");
-       return error;
+       return check_xattrs(inode, NULL, IFIRST(header), end, IFIRST(header),
+                           function, line);
 }
 
 #define xattr_check_inode(inode, header, end) \
@@ -388,6 +422,17 @@ static int ext4_xattr_inode_iget(struct inode *parent, unsigned long ea_ino,
        struct inode *inode;
        int err;
 
+       /*
+        * We have to check for this corruption early as otherwise
+        * iget_locked() could wait indefinitely for the state of our
+        * parent inode.
+        */
+       if (parent->i_ino == ea_ino) {
+               ext4_error(parent->i_sb,
+                          "Parent and EA inode have the same ino %lu", ea_ino);
+               return -EFSCORRUPTED;
+       }
+
        inode = ext4_iget(parent->i_sb, ea_ino, EXT4_IGET_NORMAL);
        if (IS_ERR(inode)) {
                err = PTR_ERR(inode);
@@ -1438,6 +1483,13 @@ static struct inode *ext4_xattr_inode_create(handle_t *handle,
        uid_t owner[2] = { i_uid_read(inode), i_gid_read(inode) };
        int err;
 
+       if (inode->i_sb->s_root == NULL) {
+               ext4_warning(inode->i_sb,
+                            "refuse to create EA inode when umounting");
+               WARN_ON(1);
+               return ERR_PTR(-EINVAL);
+       }
+
        /*
         * Let the next inode be the goal, so we try and allocate the EA inode
         * in the same group, or nearby one.
@@ -2567,9 +2619,8 @@ static int ext4_xattr_move_to_block(handle_t *handle, struct inode *inode,
 
        is = kzalloc(sizeof(struct ext4_xattr_ibody_find), GFP_NOFS);
        bs = kzalloc(sizeof(struct ext4_xattr_block_find), GFP_NOFS);
-       buffer = kvmalloc(value_size, GFP_NOFS);
        b_entry_name = kmalloc(entry->e_name_len + 1, GFP_NOFS);
-       if (!is || !bs || !buffer || !b_entry_name) {
+       if (!is || !bs || !b_entry_name) {
                error = -ENOMEM;
                goto out;
        }
@@ -2581,12 +2632,18 @@ static int ext4_xattr_move_to_block(handle_t *handle, struct inode *inode,
 
        /* Save the entry name and the entry value */
        if (entry->e_value_inum) {
+               buffer = kvmalloc(value_size, GFP_NOFS);
+               if (!buffer) {
+                       error = -ENOMEM;
+                       goto out;
+               }
+
                error = ext4_xattr_inode_get(inode, entry, buffer, value_size);
                if (error)
                        goto out;
        } else {
                size_t value_offs = le16_to_cpu(entry->e_value_offs);
-               memcpy(buffer, (void *)IFIRST(header) + value_offs, value_size);
+               buffer = (void *)IFIRST(header) + value_offs;
        }
 
        memcpy(b_entry_name, entry->e_name, entry->e_name_len);
@@ -2601,25 +2658,26 @@ static int ext4_xattr_move_to_block(handle_t *handle, struct inode *inode,
        if (error)
                goto out;
 
-       /* Remove the chosen entry from the inode */
-       error = ext4_xattr_ibody_set(handle, inode, &i, is);
-       if (error)
-               goto out;
-
        i.value = buffer;
        i.value_len = value_size;
        error = ext4_xattr_block_find(inode, &i, bs);
        if (error)
                goto out;
 
-       /* Add entry which was removed from the inode into the block */
+       /* Move ea entry from the inode into the block */
        error = ext4_xattr_block_set(handle, inode, &i, bs);
        if (error)
                goto out;
-       error = 0;
+
+       /* Remove the chosen entry from the inode */
+       i.value = NULL;
+       i.value_len = 0;
+       error = ext4_xattr_ibody_set(handle, inode, &i, is);
+
 out:
        kfree(b_entry_name);
-       kvfree(buffer);
+       if (entry->e_value_inum && buffer)
+               kvfree(buffer);
        if (is)
                brelse(is->iloc.bh);
        if (bs)